Guest – Decree Blog https://blog.decree.om Mon, 01 Jul 2024 10:46:09 +0000 en-GB hourly 1 https://wordpress.org/?v=6.6.2 https://i0.wp.com/blog.decree.om/wp-content/uploads/2021/12/favicon-decree.png?fit=32%2C32&ssl=1 Guest – Decree Blog https://blog.decree.om 32 32 197035704 Alternative Dispute Resolution in Contracts: Resolving Conflicts with Confidence https://blog.decree.om/2024/alternative-dispute-resolution-in-contracts-resolving-conflicts-with-confidence/ Mon, 01 Jul 2024 10:44:54 +0000 https://blog.decree.om/?p=2104 This guest blog post is contributed by Wadhah Al-Hinai – Legal Researcher at Sultan Qaboos University.

Contracts are the foundation of business relationships, outlining rights, obligations, and expectations between parties. However, despite careful planning and collaboration, disputes can arise, leading to costly and time-consuming legal battles. That’s where a well-crafted Alternative Dispute Resolution (“ADR”) clause comes into play. ADR refers to the different ways people can resolve disputes without a trial. Common ADR processes include mediation, arbitration, and neutral evaluation. In this article, we will explore the significance of including an ADR clause in contracts and how it can provide a fair and efficient means of resolving conflicts.

Firstly, an ADR clause helps reduce the cost of disputes. It is commonly known that litigation is often the default path for resolving disputes; however, this can be an expensive and lengthy process. Therefore, a well-drafted ADR clause offers an alternative by providing a clear roadmap for resolving conflicts outside of the courtroom. By specifying a preferred method of dispute resolution, such as mediation or arbitration, parties can save significant time, money, and resources.

Furthermore, an ADR clause serves to maintain control and confidentiality. In fact, one of the key advantages of including an ADR clause is that it allows parties to maintain control over the resolution process. Unlike litigation, where decisions are made by a judge, ADR methods enable the parties to choose a neutral third party or panel to oversee the process. This allows for greater flexibility, confidentiality, and the ability to craft solutions that best suit the specific circumstances of the dispute.

Moreover, an ADR clause aids in preserving business relationships. In business, maintaining positive relationships is crucial for long-term success. Engaging in a public and adversarial court battle can strain relationships and damage reputations. An ADR clause encourages parties to resolve conflicts amicably, preserving working relationships and promoting future collaboration. It shows a commitment to finding common ground and finding mutually beneficial solutions rather than resorting to litigation.

Additionally, an ADR clause facilitates speed and efficiency. Indeed, disputes can be time-consuming, diverting valuable resources and attention away from core business activities. With a well-defined ADR clause, parties can establish a timeline and procedure for resolving conflicts, ensuring a more efficient and timely resolution. ADR methods, such as mediation or arbitration, typically offer streamlined processes that prioritize a swift resolution.

It is noteworthy that an ADR clause is the result of a tailored process to fit the dispute. As every dispute is unique, a one-size-fits-all approach may not be the most effective solution. An ADR clause allows parties to tailor the process to the specific needs of their dispute. They can choose the most suitable method, select a qualified neutral party with expertise in the relevant field, and set guidelines for the proceedings. This flexibility helps ensure a more targeted and effective resolution.

As well, an ADR clause is important in international contracts. In today’s globalized business landscape, contracts often span international borders. In such cases, an ADR clause becomes even more critical. It helps parties navigate differences in legal systems, languages, and cultural norms. By specifying a method of dispute resolution that is recognized and enforceable internationally, such as arbitration under a respected institution like the International Chamber of Commerce (“ICC”) or the London Court of International Arbitration (“LCIA”), parties can ensure that their disputes are resolved in a neutral and impartial manner. In other words, including an internationally recognized method of dispute resolution, such as arbitration under a renowned institution, provides parties with confidence and a familiar framework for resolving cross-border conflicts.

In conclusion, an ADR clause is a powerful tool that empowers parties to address conflicts in a fair, efficient, and mutually agreeable manner. By proactively including this clause in contracts, businesses can minimize the risk of costly litigation, preserve relationships, and maintain control over the resolution process. Whether it’s through mediation, arbitration, or another alternative method, the inclusion of a well-crafted ADR clause demonstrates a commitment to resolving conflicts with confidence and integrity.

Wadhah Talib Yahya Al-Hinai is an Omani lawyer with a background in legal research and academia. Currently serving as a Legal Researcher at the Legal Affairs Department of Sultan Qaboos University, he also lectures on Business Law at the College of Economics and Political Sciences of the same university. Passionate about law and education, Wadhah is dedicated to advancing legal knowledge and nurturing the next generation of legal professionals.

If you would like to contribute to the Decree Blog, feel free to email us at blog [at] decree [dot] com.

]]>
2104
Safeguarding Trust and Privacy: The Crucial Role of Confidentiality Clauses in Contracts https://blog.decree.om/2024/safeguarding-trust-and-privacy-the-crucial-role-of-confidentiality-clauses-in-contracts/ Mon, 13 May 2024 07:27:17 +0000 https://blog.decree.om/?p=2030 This guest blog post is contributed by Wadhah Al-Hinai – Legal Researcher at Sultan Qaboos University.

In today’s interconnected business landscape, where information flows rapidly and collaborations thrive, maintaining confidentiality has become more critical than ever. For individuals and organizations alike, protecting sensitive information is vital for maintaining trust, fostering innovation, and preserving competitive advantage. This article explores the importance of confidentiality clauses in contracts and their role in safeguarding valuable assets and maintaining healthy business relationships.

Firstly, confidentiality clauses safeguard secrecy. It is of common knowledge that confidentiality clauses, often in the form of non-disclosure agreements (“NDAs”), play a crucial role in legal agreements by establishing a framework for protecting sensitive information shared between parties. These clauses outline the expectations and responsibilities of each party regarding the handling of confidential information. They require both parties to maintain the confidentiality of the information and refrain from disclosing it to unauthorized individuals or entities. This helps organizations safeguard their proprietary knowledge, trade secrets, client data, financial information, and other confidential matters from being disclosed or misused. Incorporating confidentiality clauses in contracts not only protects sensitive information but also helps build trust between parties by ensuring that the information shared is kept confidential and secure.

In addition, confidentiality clauses preserve trust and reputation. In fact, confidentiality clauses are essential components of agreements that help build and maintain trust between parties. These clauses serve to explicitly outline the obligations and expectations regarding the handling of confidential information, ensuring that sensitive data is treated with the utmost care and discretion. By clearly defining the scope of confidentiality and the consequences of breaching it, these clauses create a framework for trust. Parties can be confident that their sensitive information will be protected, which can foster a culture of trust and reliability. When individuals and organizations consistently uphold these standards, they enhance their reputation as trustworthy and reliable business partners, which can lead to more successful and mutually beneficial relationships.

Moreover, confidentiality clauses protect intellectual property. Indeed, Intellectual property (“IP”) constitutes a significant asset for many companies. Whether it involves patents, trademarks, copyrights, or trade secrets, preserving the confidentiality of IP is essential for maintaining a competitive edge. Confidentiality clauses ensure that sensitive information related to IP remains secure, preventing unauthorized disclosure, replication, or misuse that could potentially undermine an organization’s market position.

Furthermore, confidentiality clauses encourage open communication. By providing a secure environment where sensitive information can be shared without fear of unauthorized exposure, these clauses facilitate the exchange of ideas, insights, and knowledge, enabling innovation to flourish. Knowing that their confidential information is protected, individuals and organizations are more likely to engage in meaningful collaborations that drive progress.

It is also worth noting that confidentiality clauses mitigate legal risks. Indeed, in an era of increasing data breaches and cyber threats, organizations face significant legal risks when confidential information falls into the wrong hands. Confidentiality clauses serve as proactive measures to mitigate such risks. By establishing clear guidelines for the handling of sensitive data, these clauses provide a legal framework that can be invoked in the event of a breach, empowering the affected party to seek legal recourse and potential damages for any resulting harm.

Finally, confidentiality clauses strengthen business relationships. Confidentiality clauses are not just about protecting assets; they are also about fostering strong business relationships. By explicitly addressing the importance of confidentiality, parties demonstrate their commitment to maintaining the privacy and trust necessary for successful collaboration. This shared understanding helps build enduring partnerships based on mutual respect, integrity, and shared interests.

In conclusion, confidentiality clauses in contracts serve as powerful tools for protecting sensitive information, preserving trust, and nurturing healthy business relationships. By incorporating these clauses, individuals and organizations can shield their intellectual property, mitigate legal risks, encourage open communication, and safeguard their reputations. In an age where information is a valuable currency, prioritizing confidentiality through well-drafted confidentiality clauses is a proactive step towards ensuring the long-term success and prosperity of any business endeavor.

Wadhah Talib Yahya Al-Hinai is an Omani lawyer with a background in legal research and academia. Currently serving as a Legal Researcher at the Legal Affairs Department of Sultan Qaboos University, he also lectures on Business Law at the College of Economics and Political Sciences of the same university. Passionate about law and education, Wadhah is dedicated to advancing legal knowledge and nurturing the next generation of legal professionals.

If you would like to contribute to the Decree Blog, feel free to email us at blog [at] decree [dot] com.

]]>
2030
Understanding the Legal Framework: Labour Strikes and Employer Closures in Omani Employment Contracts https://blog.decree.om/2023/understanding-the-legal-framework-labour-strikes-and-employer-closures-in-omani-employment-contracts/ Tue, 10 Oct 2023 08:05:44 +0000 https://blog.decree.om/?p=1358 This guest blog post is written by Budoor Al Suwaid LLM in Commercial and Corporate Law Graduate.

An employee’s right to peacefully strike plays a fundamental role in advocating for their rights and improving their work conditions. The newly released Labour Law, promulgated by Royal Decree 53/2023, boldly emphasises the rights of employees and employers in strikes and closures. It achieves this by dedicating the entirety of Section 2 of Part 8 of the Labour Law (Articles 128-136) to such matters.

The rights of employees to strike in Oman are by no means newly introduced rights. The previous Labour Law lightly touched on the laws and regulations in the settlement of labour disputes between employers and employees. This along with the Ministry of Labour Ministerial Decision 294/2006 formed the previous statutory basis for the laws and regulations of strikes and closures.

As per the new Labour Law, in order to legally strike, employees must adhere to certain stipulations set forth by the legislator. Article 129 stipulates that employees wishing to strike or their union representatives must notify in writing the employer and all relevant authorities, including the Collective Labours Dispute Committee, at least three weeks before the specified strike date. The written notice must include the reason for the strike and the demands of the striking parties. Additionally, the declaration of the strike must receive approval from three-quarters of the members of the general assembly of the union for the strike to proceed.

However, there are limitations to employees’ rights to peacefully strike. If the strike threatens public interest, then it will be considered unlawful. Accordingly, article 128 outlines that striking employees are prohibited from inciting strikes in establishments that provide public or essential services. This includes oil instillations, petroleum refineries, ports, airports, public transportation, and any other establishments that are deemed to provide a public service by the Minister of Labour.

In line with the limitation of the employees rights to strike, a concerning aspect is that any employee that implements their right to strike shall be considered to have taken that striking period as a period of leave without pay, as specified in article 131. This is likely to deter the majority of employees from acting on their rights to strike in cases of labour disputes. Additionally, article 130 conditions that employees must call off strikes if collective labour dispute settlement procedures begin between the employees and employers.

The legislator has also imposed stricter penalties on any employees who violate article 145 of the Labour Law by obstructing or disrupting the workplace during a strike. Any striking employees who violate this provision shall be subject to either imprisonment for a period ranging from one to six months, a fine ranging from 500 OMR to 3,000 OMR, or both penalties.

The above limitations demonstrate the legislator recognising and protecting the rights of employers in regard to strikes.

The legislator has similarly imposed certain rules and regulations on the rights of employers in regard to closures. In order for employers to legally impose closures during strikes they must adhere to certain stipulations set forth by the legislator. As such, article 133 specifies that an employer has the right to completely or partially, when necessary, close their establishment to defend their interests. Employers must also notify striking employees or their labour unions, as well as any and all relevant authorities, of the closure at least three weeks in advance, providing the date and reasoning behind it, as prescribed in article 134.

However, just as employees’ rights to strike are limited, employers’ rights to closures are also restricted. Article 135 limits the rights of employers to closures by prohibiting employers from closing down establishments that provide public services including oil facilities, petroleum refineries, ports, airports, public transportation, or any other establishments that are deemed to service the public by the Minister of Labour. In addition, article 132 holds that employers must immediately stop the closure if the disputing parties agree to begin dispute settlement procedures, and are prohibited from shutting down the establishment during the settlement stages.

To counteract employers’ closure rights, the legislator mandates under article 136 that all closure days are considered paid working days for employees. Article 145 of the Labour Law also imposes strict penalties on any employers who violate the rights of the employees under articles 128, 129, 132, 134, and 135. Violating parties shall be subject to either imprisonment for a period ranging from one to six months, a fine ranging from 500 OMR to 3,000 OMR, or both penalties.

This demonstrates that the new provisions pertaining to strikes and closures introduced in the Labour Law have not only acknowledged the rights of employees to strike but have also placed a parallel emphasis on recognising the rights of employers when it comes to managing such strikes and closures.

Budoor Al Suwaid is a recent graduate with an LLM in Commercial and Corporate Law from Queen Mary, University of London. Prior to that, she received her LLB Laws degree from City, University of London.

]]>
1358
Civil and Criminal Liability of Online Platform Providers under Omani Law https://blog.decree.om/2023/civil-and-criminal-liability-of-online-platform-providers-under-omani-law/ Sun, 10 Sep 2023 06:54:45 +0000 https://blog.decree.om/?p=1238 This student article is written by Jumana Al-Masroori and Fatema Al-Nuaimi, Law Students at Sultan Qaboos University College of Law, under the supervision of Dr Saleh Al-BarashdiThis article is part of a series of student articles published on Decree in collaboration with Sultan Qaboos University College of Law to showcase the legal academic writing of Omani law students.

The widespread of the internet had a major impact on the economy through the rapid process of digitalising services,[1] which consequently led online platforms to become a habitat to numerous online transactions,[2] as such platforms allow their service providers to expand across borders and supply various markets.[3] Online platform providers can be defined as “a mediating entity operating in two or multi sided markets, which uses the internet to enable direct interactions between two or more distinct but interdependent groups of users.”[4] This article will cover the different kinds of legal liability to which platform providers may be subject to.

Oman has a wide variety of legal instruments that govern the activities of platform providers. In 2006, Oman established the Information Technology Authority by Royal Decree 52/2006, to activate the government policy for digital transformation.[5] The Information Technology Authority took the lead to establish regulations for the online environment in the Sultanate, in order to give individuals, businesses, and government agencies a high level of trust in the process of conducting transactions online. Consequently, Oman issued the Electronic Transactions Law promulgated by Royal Decree 69/2008 and the Cybercrime Law promulgated by Royal Decree 12/2011. Later, as part of the restructuring of the Omani government, the Information Technology Authority was replaced by the Ministry of Technology and Communications by Royal Decree 63/2019 which was later also replaced by the Ministry of Transport, Communications, and Information Technology by Royal Decree 90/2020, which now has the responsibility for issuing the laws and regulations governing e-transactions in general and online platform providers in particular.

The liability of online platform providers can arise under the following two categories:

Civil Liability

Generally speaking, civil liability revolves around two mediums, either the tort that may fall on the person himself, his money, or his honour,[6] or a breach of the conditions of contract.[7]  The basis of this responsibility is traced back to the rule that “there is no liability where there is no harm or breach of a prescribed right.”[8] Accordingly, civil liability can be classified into tort liability and contractual liability[9] which has been codified in Omani law in articles 157 and 176(1) of the Civil Transactions Law.

In the context of tort, it is possible to hold online platform providers liable under tort when they illegally breach their responsibility to take appropriate precautions to protect the platform users, and the breach results in violation of the rights and interests of the users.[10] Furthermore, the Electronic Transactions Law states in article 35(1) that “If damage occurs as a result of the invalidity of the certificate or because it is defective due to a mistake or negligence[…], he shall be liable for the resulting damage […]”

In the context of contractual liability, online platform providers may be held contractually liable if they fail to perform a contractually agreed-upon obligation. This is arguably the easiest approach to seeking civil responsibility for the conduct of online platform providers who have signed contracts with an operator.[11] This is confirmed by article 14(4)(a) of the Electronic Transactions Law, which states that the provisions of article 14 do not prejudice any obligations arising from any contract.

Those liable under any of the civil liability provisions mentioned above can be made responsible for compensation in accordance with article 176 of the Civil Transactions Law. This is also confirmed in regard to consumers under the Consumer Protection Law.

Criminal Liability

Criminal matters in Oman are governed by the Basic Statute of the State, which states in article 26 that “There shall be no crime or punishment except by virtue of law. There shall be no punishment except for acts subsequent to the implementation of the law providing for them. The punishment shall be personal.” In this context, criminal liability refers to the bearer of a person’s responsibility for a crime that he committed, and this is obtained by complying with the penalty prescribed by law.[12]

Criminal penalties serve a dual purpose in society: they aim to both punish individuals for their criminal actions and deter others from engaging in similar unlawful behaviour while also safeguarding the overall safety of the community. In Oman, the legislative framework has taken proactive measures to address electronic crimes and the associated penalties through the enactment of specialised laws, such as the Cybercrime Law. Additionally, the Electronic Transactions Law dedicates a chapter that addresses criminal penalties arising from the unlawful actions of platform providers. For instance, article 52 stipulates penalties such as imprisonment or fines for activities like computer intrusion, system disruption, website tampering, or internet-related offences resulting in data disruption, theft, or misuse. These penalties are consequently applied to the actions of platform providers as well.

Conclusion

In conclusion, this article has discussed the different kinds of legal liability to which online platform providers may be subject to in Oman. The article first provided an overview of the legal framework governing online platforms in Oman, before discussing the two main areas of liability: civil liability and criminal liability. In the context of civil liability, the article explained that online platform providers may be held liable for tortious acts, such as negligence, or for breach of contract. In the context of criminal liability, the article explained that online platform providers may be held liable for offences such as computer intrusion, system disruption, and website tampering.

Jumana Al-Masroori
Law Student
College of Law
Sultan Qaboos University

Fatema Al-Nuaimi
Law Student
College of Law
Sultan Qaboos University


[1] A. Ojala, A. Rialp, N. Evers ‘ Extending the international new venture phenomenon to digital platform providers: A longitudinal case study’ (2018) 53 Journal of World Business, at page 725.

[2] Kurtz, C. et al. ‘Accountability of Platform Providers for Unlawful Personal Data Processing in Their Ecosystems-A Socio-Techno-Legal Analysis of Facebook and Apple’s Ios According to Gdpr’ (2022) Journal of Responsible Technology, at page 1.

[3] Ojala, Evers, Rialp, supra note 1, at page 725.

[4] D. Beverungen, D. Kundisch, N. Wunderlich ‘Transforming into a platform provider: strategic options for industrial smart service providers’ (2020) Emerald Journal, at page 513.

[5] H. Alsaqri ‘e-commerce law in the Sultanate of Oman, obstacles and challenges and ways to confront it’ (2018) Sultan Qaboos University, at page 75.

[6] N. AlTuhami ‘liability’ (1985) Arab Journal of Security Studies, at page 8.

[7] Ibid.

[8] Ibid.

[9] T. Yoshimasa ‘A theoretical perspective on the civil liability of online platform providers’ (2019) J.Japan.L. (48) at page 72.

[10] Yoshimasa, supra note 9, at page 73.

[11] Yoshimasa, supra note 9, at page 73.

[12] Z. AlBraiki ‘Criminal liability for misuse of modern means of communication’ (2015) Sultan Qaboos University at page 25.

]]>
1238
Dirty Business: Cyberattacks on Smart Cleaning Devices https://blog.decree.om/2023/dirty-business-cyberattacks-on-cleaning-devices/ Sun, 03 Sep 2023 05:33:14 +0000 https://blog.decree.om/?p=1221 This student article is written by Sheikha Al-Yaqoubi, Law Student at Sultan Qaboos University College of Law, under the supervision of Dr Saleh Al-BarashdiThis article is part of a series of student articles published on Decree in collaboration with Sultan Qaboos University College of Law to showcase the legal academic writing of Omani law students.

The Internet-of-Things (IoT) is a term used to refer to “physical objects embedded with sensors and software that connect them to other devices and systems over the internet.”[1] Using the Internet of Things (IoT) reduces the burden of managing the household manually.[2] One of the most common households IoT devices are cleaning devices which can be defined as “machines that dispense cleaning agents automatically and adjust the quantities according to different factors (e.g., dirtiness, weight) and allow remote switching on or off.”[3] Unfortunately, as cleaning devices become more common and develop faster, the pace of developing protection techniques is not always able to keep up with the pace of the development of cleaning devices, which can result in an increased risk in cyber threats including cyberattacks.[4]

This article will explore cyberattacks carried through smart cleaning devices, the methods that the hackers can use to breach an online system, some tips to improve the safety of cleaning devices, and finally the regulation of cyberattacks in Omani law. 

The Causes of Cyberattacks Through Cleaning Devices

The use of smart cleaning devices or any other smart devices in general has become more widespread, and the chances of cyberattacks are increasing overtime because of the behaviour of the users themselves.[5] Users usually just connect the devices to the network without being aware of the technology, which can allow easy unauthorized access to the network.[6] The most common reasons that may cause a cyberattack are:

Lack of Users Technical Knowledge

As mentioned previously, the lack of users’ knowledge affects the cybersecurity of cleaning devices, but sometimes the cyberattacks happen because the users themselves do not care about the consequences of their behaviours.[7] For example, many users set a weak password (such as 1234 or 1111), and do not install software updates, all of this makes it easy for the hackers to access the system of the cleaning device.[8] Also, the secondary use of data is one of the habits that the users do because of their lack of technical knowledge. This habit indicates when the users purchase and set up a new cleaning device, they usually agree to allow their data to be used in another manner that is not related to the purpose of using the cleaning device.[9] For example, some cleaning devices use allow the users to interact with it vocally, and then this voice sample could be used by the manufacturer to improve the voice recognition software of the device.[10]

Lack of Manufacturer Technical Knowledge

Many cleaning devices manufacturers are new to the cybersecurity sector, and they do not have prior experience with cybersecurity issues, and accordingly they add connectivity features and software to the devices without paying attention to cybersecurity.[11] On the other hand, some manufacturers have the needed knowledge, but they do not have the incentives to improve the cybersecurity in these devices, because the market prioritizes low cost over security.[12]

Sheikha Al-Yaqoubi
Law Student
College of Law
Sultan Qaboos University

Methods of Hacking Used for Cyberattacks

A good knowledge in hacking methods could increase the awareness of smart homeowners as more than 40% of the smart homeowners had faced a cyberattack.[13] Cleaning devices are connected to the Internet-of-Things (IoT), and the latter is divided into four layers of application, with each layer enabling a different method of hacking.[14] The most popular methods are:

Denial of Service (DoS)

Here the hacker uses the resources of the device to affect the service availability and make it unresponsive.[15] The cleaning devices are most likely to be affected by this method due to its low processing capabilities.[16]

Access Attack/Advanced Persistent Threat (APT)

This attack enables the unauthorized person to obtain access to the network using improper ways.[17]Moreover, this method is usually used for stealing information since the hacker can stay in the network for a long time.[18]

Flooding (FLD)

In this method, the hacker sends a huge number of requests to the network of the cleaning device until the device become overwhelmed and accordingly affects its performance.[19]

Injection

The hacker uses this method to modify the data of the cleaning devices to inject malicious content, and accordingly causing the devices to leak personal information or destroy the whole system.[20]

Prevention of Cyberattacks

Nowadays, a huge number of researchers consider smart devices security as the most important thing in a smart home, as they are used by individuals on a daily basis.[21] As a result, there is an increase in research to tackle the security challenges that the users of cleaning devices may face.[22]

Applying user configurations is one of the primary ways to enhance the awareness of the users of cleaning devices and to protect the whole network.[23] This method means that the user first should create a unique name for each cleaning device that he owns, because this step will help in providing the user with the device’s name that got hacked, by sending alerts using this unique name that the user created for that device.[24] Also, the user should check if there is another device connected with the cleaning device as it can be controlled by this device (e.g., smart camera connected to the cleaning device).[25] Moreover, users should create a strong and unique password, and they should answer the challenge questions without storing them in plain text form, due to the easy access of a malicious actor to such a form.[26]

Keeping the cleaning devices up to date by upgrading the most recent version of the operating system can also provide more security features in comparison to a previous version.[27] Furthermore, the owner of cleaning devices can update these devices either by enabling automatic updates, or by contracting with a trusted vendor if the previous method is not possible.[28]

Implementing wireless network segmentation on the network of the cleaning devices can also keep the wireless communication safe and secure, because it will keep the guest Wi-Fi, primary Wi-Fi, and the cleaning devices Wi-Fi separate from each other, and consequently keep the cleaning devices away from the less secure devices that may be connected to the guest or the primary Wi-Fi network.[29]

The Regulation of Cyberattacks in the Omani Law

Since cyber threats are increasing and changing over time, a lot of countries have issued legislation to control such threats, and Oman is one of the countries that issued a cybercrimes law.[30] The Omani Cybercrime Law was promulgated by Royal Decree 12/2011, and this law applies to cybercrimes even if they are committed wholly or partially outside Oman, provided that such a crime threatens the interest of Oman, and when the outcomes of the crime take place in Oman, or are intended to take place in Oman.[31]

Article 3 of the Omani Cybercrime Law is probably the most relevant to cyberattacks resulting from hacking cleaning devices as it stipulates in its first paragraph that “Whoever wilfully and without a legitimate basis accesses an electronic site, information system, information technology means, or part of it, exceeds the access he is authorised, or continues such access after being aware of this, shall be punished with imprisonment for a period no less than a month and not exceeding six months, and a fine no less than one hundred Rial Omani and not exceeding five hundred Rial Omani, or one of those two punishments. […]”[32]

The punishment is also increased if the access results in the deletion, alteration, or modification of the data as indicated in the second paragraph of this same article stipulating that “If the acts mentioned in the first paragraph result in the deletion, alteration, modification, defacement, corruption, duplication, destruction, publication, or republication of the electronic data or information stored in the information system or the information technology means; the destruction of that system, information technology means, or the information network; or causing damage to users or beneficiaries, the punishment shall be imprisonment for a period no less than six months and not exceeding a year, and a fine no less than five hundred Rial Omani and not exceeding a thousand Rial Omani, or one of those two punishments.

The third paragraph of article 3 also provides greater punishments if the incident involves personal data as it stipulates that “If the data or information stipulated in the second paragraph is personal, the punishment shall be imprisonment for a period no less than a year and not exceeding three years, and a fine no less than one thousand Rial Omani and not exceeding three thousand Rial Omani, or one of those two punishments.”[33]

Conclusion

This article highlights the causes that may lead to a cyberattacks using cleaning devices, such as the lack of user technical knowledge and the lack of manufacturer technical knowledge. As mentioned previously, the hackers can access the system using a variety of methods such as the denial of service (DoS), access attack/advanced persistent threat (APT), flooding (FLD), and injection. Also, this articles provided a number of tips that may be used by the user to reduce the risk of cyberattacks such as utilising user configurations including using strong passwords, updating the system of the cleaning device, and implementing wireless network segmentation. Furthermore, the article highlighted the relevant articles in the Oman Cybercrime Law addressing the hacking of such devices, namely article 3 of the Cybercrime Law.


[1] Buil-Gil D., Kemp S., Kuenzel S., Coventry L., Zakhary S., Tilley D., & Nicholson J., “The digital harms of smart home devices: a systematic literature review”, Computers in Human Behavior 145, (2023), p 1.

[2] Saunders T.,” Cybersecurity challenges of the IoT-enabled home automation technology: A security by design perspective”, (2021), p 24.

[3] Nemec Zlatolas L., Feher N., & Hölbl M., “Security perception of IoT devices in smart homes”, Journal of Cybersecurity and Privacy, (2022), p 66.

[4] Ibid

[5] Hall F., Maglaras L., Aivaliotis T., Xagoraris L., Kantzavelou I., “Smart homes: security challenges and privacy concerns”, (2020), p 3.

[6] Ibid., at 3-4.

[7] Heuvel K., “Securing the Smart Home : A study on cybersecurity problems in smart home devices: does European product liability law offer meaningful legal solutions for consumers?”, Bibliotheek – Universiteit van Amsterdam, (2018), p 45.

[8] Ibid

[9] Hall, Maglaras, Aivaliotis, Xagoraris, Kantzavelou, above, at 4.

[10] Ibid

[11] Heuvel, above, at 45

[12] Ibid

[13] Ratkovic, N., “Improving Home Security Using Blockchain”, International Journal of Computations, Information and Manufacturing (IJCIM), (2022), 2(1), p 28.

[14] Hassija V., Chamola V., Saxena V., Jain D., Goyal P., Goyal B. A., “A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures,”, vol. 7, (2019), p 82725.

[15] Xhafa F., “Internet of things: engineering cyber physical human systems”, Internet of Things, (2018), p 3.

[16] Ibid

[17] Hassija, Chamola, Saxena, Jain, Goyal, Goyal, above, at 82727.

[18] Ibid

[19] Xhafa, above, at 3.

[20] Ibid, at 4

[21] Mazwa K., Mazri T., “Review on the security of smart homes in the internet of things”, (2019), p 706.

[22] Pillai MM., Helberg A., “Improving Security in Smart Home Networks through user-defined device interaction rules,” 2021 IEEE AFRICON, Arusha, Tanzania, United Republic, (2021), p 2.

[23] Ibid, at 3.

[24] Ibid

[25] Ibid

[26] National Security Agency., “Best practices for securing your home network”, Cybersecurity advisories & guidance, (2023), p 4.

[27] Ibid, at 2.

[28] Ibid

[29] Ibid, at 3.

[30] Shad H., “An overview of the sultanate’s cyber crimes law”, Oman Observer, (2017).

[31] Ibid

[32] Oman Cybercrime Law (The Cyber Crime Law 2011, Royal Decree 12/2011, Article (3).

[33] Ibid

]]>
1221
Ranked Choice Voting: A Missed Opportunity in the New Shura Elections Law https://blog.decree.om/2023/majlis-shura-elections-law/ Mon, 28 Aug 2023 04:35:20 +0000 https://blog.decree.om/?p=1201 This guest blog post is contributed by Faris Al-Said – Philosophy and Politics Graduate.

With the promulgation of the newly revised Majlis Al-Shura Elections Law, the country has taken steps forward towards a more robust framework for the elections of Majlis Al-Shura. The addition of detailed provisions for electronic voting will hopefully increase the accessibility of voting polls and puts it at the tip of our fingers, while the Electoral Grievance Committee will provide candidates as well as voters with a mechanism to voice grievances. This new law is a noteworthy legal development, but it still missed an opportunity to further improve voter representation through the introduction of ranked choice voting.

The new Shura Elections Law was promulgated in July 2023, and repeals the Shura Elections Law of 2013. The law does not make fundamental changes to the manner in which Shura elections are conducted, and instead makes a number of specific changes including new provisions to facilitate electronic voting as well as new provisions for the establishment of a new Electoral Grievance Committee to rule on complaints made against the preliminary lists of candidates and voters.

However, no change took place in regard to the mechanism for resolving a tie in elections, which I think is an issue that could have been reconsidered to further improve the election framework in Oman. Currently, as outlined in article 44 of the Shura Elections Law, when there is a tie between two candidates, both are put into a lottery to decide on who becomes the representative, and in wilayat that have two seats both are admitted into the majlis. However, while this clause does provide a solution to contested election results, it comes at the expense of greater representation. 

The missed opportunity can be showcased through an example, if candidates A, B, C, and D, are all running for a wilayat with a single seat and the first election results in candidate A receiving 30% of the votes, candidate B receiving 30%, candidate C receiving 10% and candidate D receiving the remaining 20%, even if the voters that voted for C and D could have preferred candidate A as a second choice, the clause would call for candidate A and B to be entered into a lottery in which one of them will be picked at random. This would mean that while 60% of the population would have preferred candidate A over candidate B, both A and B would have a 50% chance of winning the election in the event of a tie. (A lot of probability, I know.) 

This is an issue that election committees face all over the world and thanks to the commonality of the problem, Oman has many approaches to pick from. For instance, ranked choice voting calls for voters to not only choose a first choice but a second choice as well. Doing so means that if we take our previous example, as there was a tie between candidates A and B, the second choice of C and D voters are calculated to declare candidate A the winner with 60% of the votes. This mechanism would lead to a more representative election result while remaining inexpensive to implement, as the only change that would be made is the addition of an extra box in the ballot tickets. 

The new Shura Electoins Law has made voting more accessible with the introduction of electronic voting. It has also increased the rights of candidates to contest elections which are accused of irregularities through the formation of the Electoral Grievance Committee. Future reforms would benefit from considering whether the tie-breaker clause can be improved.

Faris Al-Said is a Philosophy and Politics Graduate from the University of Reading currently pursuing a career in International Relations.

]]>
1201
Smart Homes and Privacy Risks https://blog.decree.om/2023/smart-homes-risks-to-consumer-privacy/ Sun, 27 Aug 2023 04:40:42 +0000 https://blog.decree.om/?p=1173 This student article is written by Adeeb Al-Mazroui, Law Student at Sultan Qaboos University College of Law, under the supervision of Dr Saleh Al-Barashdi. This article is part of a series of student articles published on Decree in collaboration with Sultan Qaboos University College of Law to showcase the legal academic writing of Omani law students.

When the term “Smart” is used, this usually means that a device is capable of making the life of its user easier. In the context of “smart homes”, this simply refers to a home equipped with connected appliances with software controls.[i] These connected devices may allow the user to control them through a mobile device while being away from the home by communicating with the devices and the servers that are linked to them.

These connected devices can put the privacy of their users in danger, as it might be possible to access the data of the user by third parties, especially in cases where the technical protection applied to the connection is not sufficiently strong. Given that privacy is recognised as a fundamental human right of great significance—as recognised by various domestic, regional, and international documents,[ii] there is a great incentive for scientists and specialists to improve the technologies used to protect this fundamental right.

This article aims to illustrate and analyse some key risks to the use of smart homes and attempts to identify reasonable solutions to mitigate such risks.

Privacy Risks for Smart Homes

Even though smart homes make life easy in different ways, they also have some risks. In this article, we will focus on the risks to user privacy associated with living in a smart home, especially as information security and data protection are dynamic fields that are constantly challenged and influenced by advances in digital technologies and innovation in business practices.[iii]

Security Vulnerabilities

Smart homes usually operate on the basis of the connection between the devices inside the home, but what if the connection is insecure? This can make the user a target for cyber-attacks that risk his privacy, especially as the connection is operated by software installed on the device,[iv] and it is generally agreed that it is impossible to build software that is secure to a 100%.[v]

Adeeb Al-Mazroui
Law Student
College of Law
Sultan Qaboos University

This risk highlights the importance of having a reliable mechanism for making secure updates,[vi] that updates the security of the software used to patch any detected “bug” that can be abused to break through to security measures of the user.[vii] Generally speaking, securing the software of the user is a reasonable way to mitigate such vulnerabilities.

Cloud Computing Risks

Cloud computing is usually defined as a distributed environment based on connected virtual computers with dynamic communications between them.[viii] Cloud computing enables users to share the data used on their devices on a global cloud storage, which may be subject to the risk of being accessed by unauthorised third-parties. Generally speaking, cloud computing as a technology does not usually violate the principles of data protection, but it can be considered a risk in regard to regulated cross-border data transfers,[ix] especially as there is no specific regional legislation for personal data protection when using cloud services.[x] 

Unauthorised Access

Authorisation in the context of connections means the process of identifying the user requesting to use the service by his username and password.[xi] This process differentiates between the users that have the right to access such servers and those who do not. If a device of the user is compromised, unauthorised parties might be able to access all the devices in the smart home.[xii] For example, imagine if a user uses his phone to turn on the washing machine at home while he is at work. If a person managed to intercept his connection to obtain the password for the washing machine application, he might be able to access the entire network of devices in the home, including the phones and computers of the user.

To mitigate this risk, many applications nowadays introduced mechanisms such as forcing the user to change his password constantly.[xiii] In addition, many applications require a minimum standard of password strength.[xiv] 

Privacy Protection Methods in Smart Homes

As the number of smart devices in the home increases along with the increase in cyberattacks, it is becoming necessary to establish a comprehensive protection system to ensure the safety and security of personal information. The appropriate methods depend on the scale of risk and the data in question. This section of the article will focus on several methods that can help mitigate these risks.

Improving User Behaviour

Awareness is a key factor in any system that aims to protect the user. Research has shown that as users grow more aware of various privacy tensions, their sense of worry or fear might evoke protective actions.[xv] Such actions depend on the experience that the user has lived. Furthermore, the level of fear and worry depends on the nature of the rules and resources available in the relationship between the user and these emerging technologies.[xvi] Accordingly, user awareness towards the mentioned risks is the best first step in protection.

Utilising User Configuration

An effective method to improve the security of the smart home is to enable the user to participate in setting up the connections and configurations at the home as this can help him develop a feeling of safety and trust by involving him in the process of defining and implementing the configurations of the smart home.[xvii] For this approach to be effective, the user must be enabled to contribute to the configurations in a user-friendly manner. For example, the configurations must enable the user to assign a unique name to each device in the home,[xviii] and to choose whether or not a device is activated by certain triggers.[xix]

Connection Security

Connection security refers to all the integrated elements of the devices, network connections, interfaces, software, mobile applications, cloud services, and other aspects of the smart device.[xx] Given that many smart homes rely on connections between smart devices and the network of the supplier of the device, it is vital for the connection between the smart device and the network to be secure, and this might require the implementation of the requirements of each element in the network in order to provide adequate security.[xxi]

Conclusion

Smart users of smart homes are those who are able to utilise the advantages of the new devices in the home while limiting the risks associated with them.

This article identified a number of sources of risk regarding the use of smart homes and also identified a number of methods that users can use to manage these risks to help protect the privacy of the user.


[i] Poh GS, Gope P, & Ning J., “PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment”. IEEE Transactions on dependable and secure computing, VOL.18 (3), (2021), p. 1095.

[ii] Romansky RP., & Noninska I., “Challenges of the digital age for privacy and personal data protection”. Mathematical biosciences and engineering: MBE, (2020), p. 5291.

[iii] Ibid, at 5295.

[iv] Heuvel. K., “Securing the Smart Home” University of Amsterdam, (2018), p. 39.

[v] Ibid

[vi] Ibid

[vii] Ibid

[viii] Romansky RP, Noninska I., above 1, p. 5297.

[ix] Ibid

[x] Ibid

[xi]  Heuvel K., above 1, p. 41.

[xii] Ibid

[xiii] Ibid

[xiv] Ibid

[xv] Quach S., Thaichon P., Martin K., Weaven S. & Palmatier R., “Digital technologies: tensions in privacy and data”. Journal of the Academy of Marketing Science 50, (2022), p. 1310.

[xvi] Ibid

[xvii] Pillai MM., Helberg A., “Improving security in smart home networks through user-defined device interaction rules”. IEEE AFRICON, (2021), p.3.

[xviii] Ibid

[xix] Ibid

[xx] Romansky RP., Noninska I., above, p. 5300.

[xxi] Ibid

]]>
1173
Biotechnology: Ethical Dilemma and Financial Issues https://blog.decree.om/2023/biotechnology-ethnical-dilemma-and-financial-issues/ Sun, 20 Aug 2023 05:00:00 +0000 https://blog.decree.om/?p=1143 This student article is written by Bassam Al-Balushi, Law Student at Sultan Qaboos University College of Law, under the supervision of Dr Saleh Al-Barashdi. This article is part of a series of student articles published on Decree in collaboration with Sultan Qaboos University College of Law to showcase the legal academic writing of Omani law students.

Biotechnology has been defined by many researchers in different ways, but the most common definition is applying technology to living organisms.[1] This field is a wide sea with lots of interesting caves, some of which we have already explored while others are yet to be discovered. Although biotechnology is filled with fertile soil for opportunities, it most of the time ends up in a two-case scenario: either a financial loss or an ethical dilemma.

If we examine the issue from a legal perspective, we would find that biotechnology has a lot to offer but requires some patience and a lot of delicate work to not cross the limits, e.g., procedures of cell line companies require some supervision and agreements made with trial patients to conduct empirical research must be overseen. A lack of supervision in the abovementioned examples can cause some serious incidents, sometimes even leading to biohazardous consequences.

This article will examine a number of issues viewed from a legal perspective, some are related to the ethics of biotechnology, while others raise a financial question regarding the field; hence, we will be covering human cloning, biological weapons, genetically modified organisms’ relationship with infectious diseases, exploiting trial patients, tension between a patentee and an industry partner, and finally the dispute of distributing cell profit.

Bassam Al-Balushi
Law Student
College of Law
Sultan Qaboos University

Ethical Issues

Over the years, the field of biotechnology has encountered some of the most interesting ethical issues as science has developed. We start the first part of the article by introducing some of those ethical concerns. 

Human Cloning

As one of the most ubiquitous ethical issues out there, human cloning remains far from achieving reality, or is it?[2] The reproduction of human genetics has more to it than meets the eye and is most certainly a different path from the case of Dolly the sheep,[3] which was the only successful experiment out of 277.[4] However, the Academy of Sciences located in Shanghai, China, achieved a successful experiment in 2018 regarding the cloning of monkeys Hua Hua and Zhong Zhong, hence leaving the world with many questions.[5]

It is undeniable that research papers on human cloning create new paths in science; however, the consequences of conducting factual experiments based on those papers would beg to differ. From a medical aspect, for instance, cloning can stimulate diseases to develop and change their Pathogenesis;[6] therefore, human cloning is considered dangerous and can cause unpredictable harm.[7] As for possible legal outcomes, police might have a tough time verifying their suspects since similar physical traits would be detected during the investigation. Cloning could also make fingerprints useless. Moreover, cloning could possibly disturb the process of proving kinship.
Clones tend to live in the shadows of their originals,[8] making them an easy target for psychological disorders and therefore a victim of emotional disruption.

As the temptation to carry out more experiments on human cloning increases, the United Kingdom has decided to ban it as a precautionary measure due to the high risks involved.[9] Other instruments banning human cloning would be the Universal Declaration on the Human Genome and Human Rights (1997) and the United Nations Declaration on Human Cloning (2005).[10]

Biological Weapons

As one of the many ethical challenges of biotechnology, we are confronted with the weaponization of biological agents and the use of biohazardous weapons. As it is internationally known, there is a famous convention regarding the regulation of biological weapons called the Biological Weapons Convention (BWC),[11] also known as as the Biological and Toxin Weapons Convention (BTWC). This multilateral treaty defines biological weapons and forbids their use as a tool for solving international disputes.[12]

Parties are encouraged by the BWC to enforce their domestic laws in accordance with the treaty and its obligations,[13] but does not request any formal verification of their compliance.[14]

The BWC began its phase of accepting signatures in 1972, and while it came into force in 1975,[15] Oman ratified its adoption of the treaty in 1992 by Royal Decree 17/92.[16]

That being said, with no required evidence or proof of the necessity of compliance, cell line companies and other research establishments with access to any essential tools for developing biological weapons supposedly would not get in trouble and be held accountable;[17] however, that is not true, as it was cleared in the final declaration of the 1996 conference that reviewed the treaty.[18]

Moreover, BWC’s prohibition included numerous conducts, but it most certainly did not limit the resort to the argument of doing it for “research purposes”, as long as it fell under the meaning of peace that the treaty has mentioned in Article 1.[19] In other words, a formal educational clearance or a research license would serve just fine as an exemption. This is one way of breaching the treaty’s firewall and getting beyond its obligations.

Biological Weapons are Unethical

Biological weapons have the ability to create chaos in a way that no weapon can, harm the environment, and develop diseases.[20] Consequently, after the well-known outbreak of the COVID-19 pandemic and its contagious phase, the United Nations Secretary General opened up suspiciously about the necessity to improve BWC so it can protect the world significantly more against weaponizing diseases.[21]

Moreover, in the current Russian-Ukrainian war, allegations of the intention to use biological weapons have increased.[22] UN denied any knowledge of the subject when confronted by the Security Council.[23]

Genetically Modified Organisms (GMOs) are Future Biological Weapons

The international community undeniably stands by its statement regarding the hazards of biological weapons; however, it has yet to discover what genetic manipulation[24] can cause. GMOs are clearly at an intersection with infectious diseases. However, their promising environmental benefits[25] and noticeable financial outcomes, including high-profit margins, satisfy the majority.[26] Therefore, international regulations Like the International Health Regulations (IHR) 2005 are struggling to rein in GMO production.[27]

As for Oman, it does not encourage growing GMOs within its borders but rather urges for proper labelling to continue the importation.[28]

Exploiting the Right to Privacy of Trial Patients

One form of exploitation towards trial patients is breaching their right to privacy by sharing private medical records. As we know, experiments are crucial for any research, especially in a field where new variables appear every now and then. However, the private information gathered through experimenting with human tissue and genetics should be preserved and guarded, as it is not meant for sharing unless given consent.[29]
While artificial intelligence is becoming the new face of science, entrusting it with private information does not sound like the best of ideas. AI is meant to exceed human capabilities, with machine learning (ML) not preserving data.[30] As a result, doors would be open freely to cybercrimes and data infringements.[31] Noteworthy, the biggest cyberattack in 2018 targeted AccuDoc Solutions, with a total of 2.7 million people affected.[32]

Another form of exploiting trial patients is taking advantage of them in clinical trials with no recognition for their participation whatsoever.[33] This incident occurs for those who do not acquire health insurance due to poverty.[34]

Financial Issues

As we have encountered, as legally as possible, some of the most interesting ethical issues regarding the field of biotechnology, we will now move on to explain some interesting financial incidents that may occur within the field.

Tension Between a Patentee and an Industry Partner

A patentee is someone to whom the law has given the right to grant permission over their work;[35] therefore, without the patentee’s authorization, no investor can lay hands on their research paper.[36]

Now imagine going back and forth to negotiate over groundbreaking research, spending extensively, yet still being required to wait a long time for any capital returns, let along peaking some proper profit.[37]

Although the aforementioned scenario seems factual, it is not reality, as there are legal protective methods available to prevent such financial tension.[38] International legal instruments such as the World Intellectual Property Organization (WIPO) and the Trade-Related Aspects of Intellectual Property Rights (TRIPS) treaty guarantee the consistency of funding during the fostering period, let alone the marketing Exclusivity they urge parties to provide.[39]

Noteworthy, Oman joined WIPO by Royal Decree 74/96; hence, Oman is required to offer the above-mentioned rights to its researchers in any field, not just biotechnology.[40]

Donor’s Eligibility of Gaining Profit After Cell Donation

Research establishments conducting empirical experiments rush for a patent request once a profit-making opportunity is apparent.[41] In this case, are those who donate cells eligible to gain some of the profit?[42]

To answer the previous question, we must first seek the provisions regarding the act of donation in law. For instance, Oman’s Civil Transactions Law (promulgated by Royal Decree 29/2013) stated in Article 465(1) that if a donee performed any conduct insinuating a transfer of ownership, the donor would be prohibited from recovering his donation.[43] As a result, the donor of a cell would not be eligible for any profit if the research establishment put a patent on it, as it is an act of requesting ownership.[44] Moreover, If there was an agreement beforehand to distribute the cell’s profit, then we apply the principle of pacta sunt servanda.[45]

Conclusion

There is neither a law nor certain regulations that can possibly cover all the legal outcomes in all the various subjects of biotechnology.[46] As it is a moving train, with every valid research conclusion a new legal implication is awakened; therefore, many ethical and financial issues take advantage of the presented legal gaps.[47]

Findings

-Cloning is not ethical due to the implications it may have on the clone’s well-being, let alone all the ethics left behind.

-BWC has great potential against those who want to obtain a shelf of biological weapons; however, it has some vulnerable gaps.

-GMOs are future biological weapons unless their process is monitored and supervised.

-Oman does not grow GMOs but allows for their import.

 -Data on trial patients is not shareable; hence, it must be protected from cybercrimes targeting analytical AI systems.

 -International legal instruments keep the tension down between the patentee and investors.

-An agreement concluded beforehand would protect the donor’s right to ask for cell profit.

Recommendations

-We recommend enhancing the supervision of human cloning experiments.

-We advise filling the vulnerable gaps in the BW convention.

-We recommend adding more supervision to the GMO sector.

-For more security in trial patients’ files, an electronic personal key is advised to be kept solely with the patient.


Notes

[1] For further information see Yashon, R., Cummings, M. “Biotechnology” (2019), Momentum Press, New York, p.1.

[2] Klotzko, A. “The Cloning Sourcebook” (2003), Oxford University Press, pp.23-24; for further information see Macintosh, K. “Human Cloning: Four Fallacies and Their Legal Consequences” (2013), Cambridge University Press, p. 195.

[3] Ibid, p. 196.

[4] Ibid, p.195.

[5] Kaya, I. “Genetically Modified Organisms and Regulations Concerning Biotechnological Products” (2020), Cambridge Scholars Publishing, Newcastle upon Tyne, UK, p.83.

[6] Klotzko, supra note 2.

[7] Vöneky, S., Wolfrum, R. “Human Dignity and Human Cloning” (2004), Leiden: Brill | Nijhoff, p.126.

[8] Klotzko, supra note 2 at 204-205.

[9] Mayor, S. “UK government confirms ban on human reproductive cloning” (1999) British Medical Journal vol 319,7201.

[10] For further information see Kaya, supra note 5 at 88-92.

[11] The Nuclear Threat Initiative, “Biological Weapons Convention (BWC)” (2023), available at: https://www.nti.org/education-center/treaties-and-regimes/convention-prohibition-development-production-and-stockpiling-bacteriological-biological-and-toxin-weapons-btwc/. accessed 25 July 2023.

[12] Ibid

[13] Ibid

[14] Ibid

[15] Ibid

[16] Royal Decree 17/1992 Approving the Accession of the Sultanate to the Convention on the Prohibition of the Development, Production and Stockpiling of Bacteriological (Biological) and Toxin Weapons and on their Destruction (issued 24 February 1992, published 1 March 1992) Official Gazette 474.

[17] The Nuclear Threat Initiative, supra note 11.

[18] Ibid

[19] Ibid

[20] Tychinin, D., Kosterin, P. “Contribution of Biotechnology to Chemical-Weapons Destruction”, (2002), available at: https://doi-org.squ.idm.oclc.org/10.1007/BF02987492. accessed 2nd July 2023, p.218.

[21] The Nuclear Threat Initiative, supra note 11.

[22] Ibid

[23] Ibid

[24] For further information see Kaya, supra note 5, at 1.

[25] Pool, R., National Research Council, Division on Earth and Life Studies, Board on Life Sciences, “Environmental Contamination, Biotechnology, and the Law: The Impact of Emerging Genomic Information: Summary of a Forum” (2001), National Academies Press, Washington, p.23; for further information see Kaya, supra note 5, at 11-15.

[26] Mariani, M. “The Intersection of International Law, Agricultural Biotechnology, and Infectious Disease” (2007), Leiden: Brill | Nijhoff, p.215; for further information see Kaya, supra note 5, at 8-10.

[27] Kaya, supra note 5, at 213.

[28] Al-Sadqi, N., Alansari, A. “Detection of Unlabeled Genetically Modified Soybean in the Omani Market” (2016), SQU Journal for Science vol 21(1), pp. 1-6, p.2.

[29] Khalid, N., Qayyum, A., Bilal, M., Al-Fuqaha, A., Qadir, J. “Privacy-preserving artificial intelligence in healthcare: Techniques and applications” (2023) Computers in Biology and Medicine Journal vol 163, pp. 1 – 21, p.3; for further information see Taylor, M. “Genetic Data and the Law: A Critical Perspective on Privacy Protection” (2012), Cambridge University Press, p.186.

[30] Khalid, supra note 29.

[31] Ibid, pp.4-7; for further information see Rathee, A. “Data Breaches in Healthcare: A Case Study” (2020), CYBERNOMICS vol 2(2), pp. 25-2, p.25.

[32] Khalid, supra note 29, at 4.

[33] Dal‐Ré, R., Rid, A., Emanuel, E., Wendler, D. “The potential exploitation of research participants in high income countries who lack access to health care” (2016) British Journal of Clinical Pharmacology vol 81, pp. 857 – 864.

[34] Ibid

[35] Marsoof, A., Kariyawasam, K., Talagala, C. “Reframing Intellectual Property Law in Sri Lanka: Lessons from the Developing World and Beyond” (2022), Springer Singapore, 1st ed, p.34.

[36] Gersten, D. “The quest for market exclusivity in biotechnology: Navigating the patent minefield”, (2005), available at: https://doi-org.squ.idm.oclc.org/10.1602/neurorx.2.4.572. accessed 2nd July 2023, p.573.

[37] The University of Tasmania, “We need to think about the legal implications of futuristic biotech” (2018), available at: https://www.utas.edu.au/about/news-and-stories/articles/2018/760-we-need-to-think-about-the-legal-implications-of-futuristic-biotech. accessed 25 July 2023.

[38] Abdel-Maguid, M. “Protection of Intellectual Property Rights for Biotechnology Products” (2007) Agricultural Investment Journal vol 5, pp. 45 – 49, p.45.

[39] Ibid, p.46; for further information see Gersten, supra note 36, p.573.

[40] Al-Wahaiby, J. “Intellectual Property System in the Sultanate of Oman”, WIPO Introductory Seminar on Intellectual Property (2004), Muscat, the World Intellectual Property Organization (WIPO), p.6.

[41] Hodgson, C. “Social and Legal Issues of Biotechnology” (1987) The Ohio Journal of Science vol 87, pp. 148 -153, p.152.

[42] Ibid

[43] The Civil Transactions Law 2013, Royal Decree 29/2013 (issued 6 May 2013, published 12 May 2013) Official Gazette 1012.

[44] Gersten, supra note 39.

[45] Kunz, J. “The Meaning and the Range of the Norm Pacta Sunt Servanda” (1945), American Journal of International Law vol 39(2), pp. 180-197.

[46] Morrison, A. “Biotechnology Law: A Primer for Scientists” (2019), Columbia University Press, New York, p.1; for further information see Novikova, R. “Legal regulation in the field of genetically modified organisms (GMO) turnover in Russia and foreign countries” (2021) RUDN Journal of Law vol 25, pp. 32 – 66, p.33.

[47] Pool, R., National Research Council, Division on Earth and Life Studies, Board on Life Sciences, “Environmental Contamination, Biotechnology, and the Law: The Impact of Emerging Genomic Information: Summary of a Forum” (2001), National Academies Press, Washington, pp.13-21.

]]>
1143
Protection of the Rights of the Disabled Under Omani Law https://blog.decree.om/2023/protection-of-the-rights-of-the-disabled-under-omani-law/ Sat, 05 Aug 2023 06:05:55 +0000 https://blog.decree.om/?p=945 This guest blog post is contributed by Duniya Al-Nabhani – Law Master’s Student and SQE Candidate.

The recently issued Social Protection Law confirmed the importance that Oman gives to persons with disabilities by providing several rights and benefits to this vulnerable social group. These rights and benefits include providing a monthly guaranteed financial subsidy to every person with a disability and also allowing persons with disabilities to retire 10 years earlier than persons without disabilities. These fundamental rights granted by this new groundbreaking law are not the first or the only rights granted by Omani law to persons with disabilities as the Omani legal system has long recognised the need to provide them with special protections to address the inequality they face due to their disability. This post will highlight some of the other Omani laws that recognise the rights of the disabled.

The Basic Statute of the State

From the outset, the Omani Basic Statute of the State, i.e. the Constitution, recognises the rights of the disabled as a constitutional right under article 15 as it stipulates that the government shall provide care for children, persons with disabilities, the youth, and young individuals. This makes the protection of the disabled a constitutional fundamental right.

The Law on the Care and Rehabilitation of the Disabled

In addition to this, Oman has a dedicated law titled the Law on the Care and Rehabilitation of the Disabled promulgated by Royal Decree 63/2008, which defines key terms related to disabilities and outlines the responsibilities of the Ministry of Social Development and other government bodies in providing care and rehabilitation services. The law focuses on healthcare, education, vocational rehabilitation, employment opportunities, establishment of rehabilitation centres, and issuance of rehabilitation certificates.

The Law of the Child

In addition to this standalone Law on the Care and Rehabilitation of the Disabled, many other Omani laws have dedicated provisions relating to the protection of persons with disabilities. For example, Article 15 of the Law of the Child requires competent state bodies to take preventive and remedial measures for disability detection and appropriate treatment and to promote equality and non-discrimination based on various grounds, including disability. Article 52 of this law also guarantees the care and rehabilitation of disabled children in accordance with the Law on the Care and Rehabilitation of the Disabled.

The Labour Law

The Labour Law has long recognised the rights of the disabled and the need for integrating them, and this was reconfirmed in the newly issued Labour Law of 2023 which stipulates in article 24 that an employer who employs 40 or more workers must commit to hiring qualified disabled Omanis for jobs suitable to their conditions, within the limits of the ratio set by the ministerial decision.

The School Education Law

The School Education Law promulgated by Royal Decree 31/2023 also mandates in Article 34 that the Ministry of Education shall construct and maintain government school buildings that meet specific standards and requirements, and this includes ensuring suitable facilities and provisions for students with disabilities.

Telecommunication Service Regulation for the Disabled

It is also worth noting that the Telecommunications Regulatory Authority also issued Decision 41/2014 issuing the Regulation of the Provision of Telecommunication Services for the Disabled, which requires telecommunication licensees to offer various services, including interconnection services, voice, SMS, multimedia, video calling and data services, emergency call services, and directory services, to enhance accessibility for individuals with disabilities.

Conclusion

There is no doubt that the Oman legal system has put a significant amount of effort in supporting and integrating persons with disabilities. However, it is important to recognise that a lot of work is still required to fully realise the rights of the disabled as noted in a number of UN reports on Oman’s implementation of the Convention on the Rights of Persons with Disabilities. Such issues that Oman is required to work include additional work in the area of education to ensure an inclusive educational environment and providing specialised training for educators are vital for empowering individuals with disabilities through education; additional work in the area of employment as integrating persons with unique and different disabilities remains a challenge; and additional work in the area of physical accessibility as creating an environment that is accessible to all individuals, regardless of disability, requires significant financial investments.

Duniya Al-Nabhani is a Law Master’s student and an SQE Candidate at the University of Law. She has previously completed legal work experience in private practice and in-house legal teams.

]]>
945
Enforcement of Foreign Judgments in Oman: The Significance of the Reciprocity Principle https://blog.decree.om/2023/enforcement-of-foreign-judgments-in-oman-the-significance-of-the-reciprocity-principle/ Thu, 23 Feb 2023 13:00:00 +0000 https://blog.decree.om/?p=588 This guest blog post is contributed by Dr Bader Al-Maskari – Assistant Dean of Postgraduate Studies and Research at the College of Law in Sultan Qaboos University.

Similar to most jurisdictions around the world, the enforcement of foreign judgments is a complicated matter in Oman in the absence of a bilateral treaty for the mutual recognition of judgments. Under Omani law, the enforcement of civil and commercial judgments is governed by article 352 of the Civil and Commercial Procedures Law promulgated by Royal Decree 29/2002. This article examines one of the key elements required by article 352: reciprocity in the enforcement of Omani judgments in the jurisdiction from which the judgment sought to be enforced is made.

The principle of reciprocity as a general concept is widely recognised and considered in public international law along with the principles of national treaty (the principle that foreigners must be given the same treatment as nationals) and most favoured nation treatment (the principle that foreigners must be given the same treatment given in the country to foreigners of a third country if this treatment is better).

The principle of reciprocity simply requires a state to provide foreigners a certain treatment if the home country of these foreigners provides the same treatment to the nationals of the first-mentioned state. For example, if Oman followed the principle of reciprocity in regard to entry of nationals without a visa with Country X, the nationals of Country X will be allowed to enter Oman without a visa if Country X allows Omani nationals to enter Country X without a visa.

There are many rationales for adopting the principle of reciprocity as this principle allows the state to bargain with other states to provide special treatment for its own nationals by providing this same treatment to the nationals of these other states, which can provide opportunities for both the nationals of Oman and the nationals of these other states in a way that contributes to the realisation of the better well being of all parties involved, increased exchanges in all aspects of life between them, including that of foreign investment.

In regard to the recognition of foreign judgments, the Civil and Commercial Procedures Law provides in article 352 a number of conditions before Omani courts are permitted to recognise and enforce such judgments, namely:

  1. That the judgment is issued from a competent judicial authority and that the judgment is final.
  2. That the litigants in the dispute were properly notified of the lawsuit and they were properly represented in it. 
  3. That the judgment does not involve a matter that violates Omani law.
  4. That the judgment does not contradict a previous judgment issued by Omani courts and that it does not prejudice public order or morals.
  5. That the country from which the judgment is made accepts enforcing Omani judgments.

The existence of a requirement of reciprocity appears at the first instance to be a logical and a reasonable requirement to have, especially if Oman is motivated by the desire to provide those with Omani judgments in their favour to also have their judgments enforced in other countries. This requirement has also been confirmed by the Supreme Court in a number of its judgments.

Notwithstanding the motivations behind this requirement, its application in real life appears to be challenging and operates as an obstacle to the enforcement of legitimate judgments that ought to be enforced. Conceptually, this requirement places a significant burden on the judge as it requires him to be aware of the position of a foreign legal system in regard to the enforcement of Omani judgments, which is not only difficult to determine, but is probably a position that does not exist at all if no Omani judgment was ever presented to that foreign legal system to test its enforceability. Furthermore, this requirement may carry political aspects as it becomes subjective and reliant on the existence of bilateral relations between the two countries in a manner that does not necessarily contribute to protection of the rights of the litigants or the realisation of justice.

While it might be easy to argue that the first four elements of article 352 should be sufficient to allow a court to recognise a foreign judgement, the practical reality of the differences between the legal systems of countries all around the world makes it difficult to figure out a quick and systematic approach for recognising foreign judgments by local courts, in Oman or elsewhere, and that is the very reason why states signed multilateral and bilateral treaties for judicial cooperation and the recognition of foreign judgments such as the Riyadh Agreement and the Judicial Cooperation Agreement between Oman and India.

Dr Bader Al-Maskari is the Assistant Dean of Postgraduate Studies and Research at the College of Law in Sultan Qaboos University. Dr Bader is also a member of Sultan Qaboos University Research Council and has published articles in a variety of local and international academic journals as well as traditional newspapers. He holds a PhD in Private International Law from the University of Leicester in the United Kingdom, and he is admitted to appear before courts of appeal in Sultanate of Oman.

If you would like to contribute to the Decree Blog, feel free to email us at blog [at] decree [dot] com.

]]>
588